On 11/03/07, Wojciech Puchar <[EMAIL PROTECTED]> wrote:
> There have been *many* problems over the years with rsh and telnet. rsh's
> security model comes from a time when people thought computers would never
exactly true. so i use rsh between MY machines and rsh and telnet when
sniffing is not
There have been *many* problems over the years with rsh and telnet. rsh's
security model comes from a time when people thought computers would never
exactly true. so i use rsh between MY machines and rsh and telnet when
sniffing is not a problem.
wasn't easier just to answer the question?
___
Wojciech Puchar wrote:
can it be set to make possible to login root to machine through
telnet and without telneting to some user and then su -
?
with sshd and rshd it can be set, with telnetd - no success.
once again - can someone answer my question instead of giving very
"intelligent" commen
Wojciech Puchar wrote:
so generalizing that "telnet and rsh is bad" is as stupid as telling
that oxygen is bad as it makes fires.
Well, that's true, but if you have the choice, there are better choices.
You *can* hammer in nails with the butt of a gun, but there's a chance
you'll somehow shoot
once again - can someone answer my question instead of giving very
"intelligent" comments?
___
If I remember correctly, you edit /etc/ttys and set some of your ttyp* (i.e.
network ptys) to be 'SECURE'. It really isn't a good idea though. The reason
i